Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is Business Continuity and Disaster Recovery (BCDR)?

Running a business is no easy feat, and it's made that much harder by the threat of natural disasters, data breaches, or cyberattacks that can happen at any given moment. Such cases can lead to delayed business operations, financial or legal problems, or even business shutting down. So, how can businesses prepare for the worst? The answer lies in implementing a Business Continuity and Disaster Recovery (BCDR) plan.

CISA Warns of Hackers Targeting Industrial Systems with "Unsophisticated Methods" Amid Lebanon Water Hack Claims

The US Cybersecurity and Infrastructure Security Agency (CISA) has warned that malicious hackers continue to be capable of compromising industrial control systems (ICS) and other operational technology (OT) using "unsophisticated methods" - suggesting that much more still needs to be done to secure them properly.

Complexity of Attack Surface Management in Cloud Environments

Legacy attack surfaces were small and simple. There were fewer servers and endpoints to protect. The tooling required to secure it was basic – perimeter firewalls, antivirus software, and server/network/application monitoring tools. When organizations migrate to the cloud, things change and become complex. For starters, on-premise infrastructure and applications can’t be left out in favor of the cloud. Most organizations run hybrid setups.

DCRat Targets Users with HTML Smuggling

DCRat (also known as Dark Crystal RAT) is a modular remote access Trojan (RAT) which is offered as malware-as-a-service (MaaS) and has been around since 2018. It is written in C# and has typical RAT and information stealing capabilities, such as executing shell commands, logging keystrokes, exfiltrating files and credentials, among others.

Shaping the Future of Finance: Key Takeaways from TOKEN2049 Singapore

TOKEN2049 Singapore was a melting pot of global leaders and cutting-edge trends in the crypto space with over 20,000 visitors, 400 exhibitors, and 600 side events. Amid all of the expert discussions and industry thought leadership, I sat down to examine what I thought were the most important takeaways from the world’s biggest crypto event.

The most effective attack surface management tools and techniques

The ability to manage and monitor your attack surface is no longer a luxury—it’s a necessity. The rapid expansion of networks, coupled with the shift to cloud computing and remote work, has created a vast and ever-changing attack surface that requires constant vigilance. This article delves into the most effective attack surface management tools and techniques, offering insights into how they can bolster your cyber security posture and safeguard your organisation against evolving threats.

Sequoia spotlight: Deploying the newest macOS with Endpoint Central

Apple released its new macOS Sequoia 15.0 on Sept. 16, and we at ManageEngine are excited to announce our support from the day of its release. Before we get into the details, let’s look at which devices are eligible for the facelift. Source: Apple Sequoia was unveiled at WWDC 2024 with a range of features around privacy, security, and its much-awaited Apple Intelligence.

Logs in a SIEM: The Liquid Gold of Cybersecurity

Devices, applications, and systems logs are needed to detect, analyze, and mitigate cybersecurity threats. Logs in a SIEM are like gold; they are both valuable. Gold is part of the economy, and logs are part of the IT ecosystem and are the foundation for cybersecurity. Here’s why they compare to liquid gold!